Unlock instant, AI-driven research and patent intelligence for your innovation.

A security protection method and terminal for VR resources

A security protection and resource technology, applied in the field of data processing, can solve the problems of large space, large space and time, and difficulty in protecting the rights and interests of service providers, and achieve the effect of reducing space and time

Active Publication Date: 2021-02-09
FUJIAN TIANQUAN EDUCATION TECH LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the size of VR resources is generally larger than 100 megabytes and takes up a lot of space, it takes a lot of space and time to load them into the memory for encryption. Therefore, most of the existing VR resources are in an unencrypted state. use, it is difficult to protect the rights and interests of service providers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security protection method and terminal for VR resources
  • A security protection method and terminal for VR resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] This embodiment provides a security protection method for VR resources, including:

[0056] S1. Encrypt the VR resource stored on the disk by means of a memory-mapped file to obtain an encrypted file. Specifically:

[0057] S11. A preset key information table; the key information table stores a key corresponding to each encryption operation.

[0058] S12. Obtain the startup time of the system, and obtain the first key.

[0059] S13. Obtain the key corresponding to the last encryption operation from the key information table to obtain the second key.

[0060] S14. Using the first key and the second key as input parameters of a preset random algorithm, calculate a random value.

[0061] Optionally, the random algorithm is an elliptic algorithm.

[0062] S15. Set a start encryption position and an end encryption position corresponding to the VR resource according to the random value to obtain an encryption interval.

[0063] For example: Get the byte size of VR resour...

Embodiment 2

[0072] This embodiment provides a security protection terminal for VR resources, including one or more processors 1 and a memory 2, the memory 2 stores a program, and is configured to be executed by the one or more processors 1 in the following steps :

[0073] S1. Encrypt the VR resource stored on the disk by means of a memory-mapped file to obtain an encrypted file. Specifically:

[0074] S11. A preset key information table; the key information table stores a key corresponding to each encryption operation.

[0075] S12. Obtain the startup time of the system, and obtain the first key.

[0076] S13. Obtain the key corresponding to the last encryption operation from the key information table to obtain the second key.

[0077] S14. Using the first key and the second key as input parameters of a preset random algorithm, calculate a random value.

[0078] Optionally, the random algorithm is an elliptic algorithm.

[0079] S15. Set a start encryption position and an end encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of data processing, in particular to a VR resource security protection method and terminal. The present invention encrypts the VR resources stored on the disk by means of memory mapping files to obtain encrypted files; and synchronizes the encrypted files to the client. Realized reducing the space and time occupied in the process of encrypting VR resources.

Description

technical field [0001] The present invention relates to the field of data processing, in particular to a VR resource security protection method and terminal. Background technique [0002] With the popularity of VR (Virtual Reality) technology, many service providers provide various VR resources for users to use in different scenarios. Among them, the more popular are VR resources for teaching and games. Because the size of VR resources is generally larger than 100 megabytes and takes up a lot of space, it takes a lot of space and time to load them into the memory for encryption. Therefore, most of the existing VR resources are in an unencrypted state. It is difficult to protect the rights and interests of service providers. Contents of the invention [0003] The technical problem to be solved by the present invention is: how to reduce the space and time occupied in the process of encrypting VR resources. [0004] In order to solve the problems of the technologies descri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6218G06F2221/2107Y02D10/00
Inventor 刘德建丁迪锋周小白曾捷
Owner FUJIAN TIANQUAN EDUCATION TECH LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More